GHSA-mwv9-gp5h-frr4
ADVISORY - githubSummary
In some circumstances, devalue.parse and devalue.unflatten could emit objects with __proto__ own properties. This in and of itself is not a security vulnerability (and is possible with, for example, JSON.parse as well), but it can result in prototype injection if downstream code handles it incorrectly:
const result = devalue.parse(/* input creating an object with a __proto__ property */);
const target = {};
Object.assign(target, result); // target's prototype is now polluted
Common Weakness Enumeration (CWE)
ADVISORY - github
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in